Title :
Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator
Author :
Sabbaghi, Arash ; Mahmoudi, Fariborz
Author_Institution :
Dept. of Electr., Comput. & IT Eng., Azad Univ., Qazvin, Iran
Abstract :
Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.
Keywords :
SQL; auditing; cryptography; records management; SQL command keywords; illegal modification; illegal reading; information security; record authenticator; secure searchable encrypted audit log; secure system; Computer security; Cryptography; Data security; Databases; Electric resistance; Information security; Intrusion detection; Power system protection; Privacy; Software systems; Audit Log; Privacy; Security;
Conference_Titel :
Computer Technology and Development, 2009. ICCTD '09. International Conference on
Conference_Location :
Kota Kinabalu
Print_ISBN :
978-0-7695-3892-1
DOI :
10.1109/ICCTD.2009.228